The present disclosure relates generally to RFID technology.
RFID technology generally involves interrogating an RFID tag with radio frequency (RF) waves and reading the responding RF waves with an RFID reader. An RFID tag typically includes a miniscule microchip coupled to an RF antenna. RFID tags can be attached to the object to be identified. An RFID reader typically includes an antenna coupled to a transmitter and a receiver. The RFID reader is generally associated with some read zones, and only those RFID tags located within the read zones are read by the RFID reader. A user generally may not know the boundaries of the read zones, because the field strengths of the RF waves at different locations are not readily visible. Accordingly, it is desirable to find a method or apparatus that can provide some good visual aid to the boundaries of the read zones of RFID readers.
In one aspect, the invention is directed to an apparatus. The apparatus includes a supporting sheet, a reader-position mark on the supporting sheet to indicate a recommended location to position an RFID reader, and a zone-boundary mark on the supporting sheet to indicate a read zone of the RFID reader with a predetermined field strength.
In another aspect, the invention is directed to an apparatus. The apparatus includes a supporting sheet, a reader-position mark on the supporting sheet to indicate a recommended location to position an RFID reader, and a plurality of zone-boundary marks on the supporting sheet to indicate read zones of the RFID reader. Each zone-boundary mark indicates a corresponding read zone having a predetermined field strength associated therewith.
Implementations of the invention can include one or more of the following advantages. The boundaries of the read zones of RFID readers can be more easily recognized. These and other advantages of the present invention will become apparent to those skilled in the art upon a reading of the following specification of the invention and a study of the several figures of the drawings.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
In operation, the transmitter 22 generates an RF interrogation signal. This RF interrogation signal is coupled to the antenna 28 through the three-port circulator 23. The electromagnetic waves radiated from the antenna 28 are then received by the antenna in an RFID tag. In response to the interrogation from the RFID reader, the RF tag will reflect back some responding electromagnetic waves coded with the identification information of the RF tag. The responding electromagnetic waves are picked up by the antenna 28 as a responding RF signal. The responding RF signal enters the circulator 23 and is received by the receiver 24. The RF signal received by the receiver, after amplification, is demodulated with demodulator 26 that receives a reference RF signal from the frequency generator 21. The demodulated signals from the demodulator 26 is coupled to certain signal processing circuit to decode from the demodulated signal the identification information returned by the RF tag.
In some implementations, the demodulator 26 is a dual quadrature demodulator, and the demodulated signals from the demodulator 26 can be a demodulated vector signal that includes two components, the in-phase demodulated signal Irx and the quadrature demodulated signal Qrx. This demodulated vector signal can be coupled to certain signal processing circuit for further signal processing.
The RFID reader 20 can be used as a stand alone device or can be added to other data capture devices. For example, the RFID reader 20 can be installed at a checkout workstation that may have an optical barcode reader installed also. The RFID reader 20 can also be added to a handheld device, such as, an optical barcode reader. In some implementations, the handheld device having the RFID reader 20 can be operated in both the handheld mode and the workstation mode.
In one implementation, each given zone-boundary mark includes a contour representing those positions where the field strength is substantially equal to the predetermined field strength associated with the corresponding read zone. For example, the contour 54A can be drawn in such away that most of those positions on the contour 54A have substantially the same predetermined field strength EA, and the field strength of any position within the read zones 55A is generally larger than the predetermined field strength EA. Similarly, the contour 54B can be drawn to indicate the read zones 55B in which the field strength of any position is generally larger than a predetermined field strength EB, and the contour 54C can be drawn to indicate the read zones 55C in which the field strength of any position is generally larger than a predetermined field strength EC. In
In
In
In one implementation, a light indicator at a given position can be configured to emit visible light when the field strength at the given position exceeds the predetermined field strength associated with the corresponding read zone. For example, as shown in
In addition to making the effective read zone of the RFID reader 20 more visible to users with zone-boundary marks, the effective read zone of the RFID reader 20 can also be modified with RF shields and/or RF jammers. The mat 50 on its own is a good visual aid, but the RF field does not stop instantaneously at the mat's edge. It is therefore desirable to have some level of control over the RFID read zone pattern, especially for a point of sale reader, while still maintaining robust read links in the desired read zones.
In
In
In a point of sale application, as each item moves from the pre-charge zone to the post-charge zone, the product cost can be added to the total charges. If one were to take an item from the post-charge zone back through the charge zone to the pre-charge zone, the charges could be automatically removed from the total. If an uncharged for item were to, through some other then normal means, show up in the post-charge zone, it could be easily be identified and charged for. If it were to happen too often, cameras could be triggered and or security alerted.
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Number | Name | Date | Kind |
---|---|---|---|
4937585 | Shoemaker | Jun 1990 | A |
5528222 | Moskowitz et al. | Jun 1996 | A |
6121544 | Petsinger | Sep 2000 | A |
6794000 | Adams et al. | Sep 2004 | B2 |
7289884 | Takahashi et al. | Oct 2007 | B1 |
7327262 | Motteram et al. | Feb 2008 | B2 |
7369048 | Freund | May 2008 | B2 |
7669143 | Shigekusa | Feb 2010 | B2 |
7821386 | Barrett et al. | Oct 2010 | B1 |
7902984 | Duron et al. | Mar 2011 | B2 |
7997481 | Shieh | Aug 2011 | B2 |
8049769 | Nakanishi et al. | Nov 2011 | B2 |
20020024421 | Kang | Feb 2002 | A1 |
20040095244 | Conwell et al. | May 2004 | A1 |
20050206555 | Bridgelall et al. | Sep 2005 | A1 |
20060028379 | Oberle | Feb 2006 | A1 |
20060043199 | Baba et al. | Mar 2006 | A1 |
20060103532 | Van Fleet | May 2006 | A1 |
20060132312 | Tavormina | Jun 2006 | A1 |
20060226989 | Hillegass | Oct 2006 | A1 |
20070041034 | Gombert | Feb 2007 | A1 |
20070152058 | Yeakley et al. | Jul 2007 | A1 |
20070152830 | Burr | Jul 2007 | A1 |
20070222595 | Motteram et al. | Sep 2007 | A1 |
20070257800 | Yang et al. | Nov 2007 | A1 |
20070276558 | Kim | Nov 2007 | A1 |
20080079585 | Hirota et al. | Apr 2008 | A1 |
20080087723 | Kargl et al. | Apr 2008 | A1 |
20080088415 | Quan | Apr 2008 | A1 |
20080100450 | Ayyagari et al. | May 2008 | A1 |
20080238621 | Rofougaran et al. | Oct 2008 | A1 |
20080290993 | Ryoo et al. | Nov 2008 | A1 |
20080309463 | Godzwon et al. | Dec 2008 | A1 |
20090066987 | Inokuchi | Mar 2009 | A1 |
20090086228 | Yoshida | Apr 2009 | A1 |
20090160612 | Varpula et al. | Jun 2009 | A1 |
20090167502 | Erickson et al. | Jul 2009 | A1 |
20090174556 | Horne et al. | Jul 2009 | A1 |
20090179742 | Takeshima et al. | Jul 2009 | A1 |
20090184802 | Park | Jul 2009 | A1 |
20090218401 | Moran et al. | Sep 2009 | A1 |
20090219158 | Nikitin et al. | Sep 2009 | A1 |
20090256349 | Strubin et al. | Oct 2009 | A1 |
20090265133 | Baek et al. | Oct 2009 | A1 |
20090295645 | Campero et al. | Dec 2009 | A1 |
20100039231 | Fuchs et al. | Feb 2010 | A1 |
20100080345 | Schilling et al. | Apr 2010 | A1 |
20100097273 | Biris et al. | Apr 2010 | A1 |
20100188211 | Brommer et al. | Jul 2010 | A1 |
20100289617 | Hill | Nov 2010 | A1 |
20110089634 | Thorson et al. | Apr 2011 | A1 |
20110291810 | Rokhsaz et al. | Dec 2011 | A1 |
Number | Date | Country |
---|---|---|
1865438 | Dec 2007 | EP |
Entry |
---|
International Search Report and Written Opinion for related counterpart International Patent Application No. PCT/US2010/055551 mailed on Feb. 9, 2011. |
International Preliminary Report on Patentability and Written Opinion for related counterpart International Patent Application No. PCT/US2010/055551 mailed on Jun. 5, 2012. |
Non Final Office Action mailed on Mar. 30, 2012 in U.S. Appl. No. 12/626,999, Timothy B. Austin, filed Nov. 30, 2009. |
Notice of Allowance mailed Sep. 19, 2012 in U.S. Appl. No. 12/626,999, David E. Bellows, filed Nov. 30, 2009. |
Number | Date | Country | |
---|---|---|---|
20110130085 A1 | Jun 2011 | US |